Vulnerabilities > Jenkins > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-11-25 | CVE-2015-5318 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack. | 6.8 |
2015-11-25 | CVE-2015-5317 | Information Exposure vulnerability in Jenkins The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request. | 5.0 |
2015-10-16 | CVE-2015-1813 | Cross-site Scripting vulnerability in Jenkins Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1812. | 4.3 |
2015-10-16 | CVE-2015-1812 | Cross-site Scripting vulnerability in Jenkins Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1813. | 4.3 |
2015-10-16 | CVE-2015-1810 | Permissions, Privileges, and Access Controls vulnerability in multiple products The HudsonPrivateSecurityRealm class in Jenkins before 1.600 and LTS before 1.596.1 does not restrict access to reserved names when using the "Jenkins' own user database" setting, which allows remote attackers to gain privileges by creating a reserved name. | 4.6 |
2015-10-16 | CVE-2015-1806 | Permissions, Privileges, and Access Controls vulnerability in Jenkins The combination filter Groovy script in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with job configuration permission to gain privileges and execute arbitrary code on the master via unspecified vectors. | 6.5 |
2014-10-17 | CVE-2014-2066 | Improper Authentication vulnerability in Jenkins Session fixation vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack web sessions via vectors involving the "override" of Jenkins cookies. | 6.8 |
2014-10-17 | CVE-2014-2065 | Cross-Site Scripting vulnerability in Jenkins Cross-site scripting (XSS) vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to inject arbitrary web script or HTML via the iconSize cookie. | 4.3 |
2014-10-17 | CVE-2014-2064 | Information Exposure vulnerability in Jenkins The loadUserByUsername function in hudson/security/HudsonPrivateSecurityRealm.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to determine whether a user exists via vectors related to failed login attempts. | 5.0 |
2014-10-17 | CVE-2014-2062 | Improper Authentication vulnerability in Jenkins Jenkins before 1.551 and LTS before 1.532.2 does not invalidate the API token when a user is deleted, which allows remote authenticated users to retain access via the token. | 6.5 |